aboutsummaryrefslogtreecommitdiffstats
path: root/testing/tests/ikev2/ocsp-untrusted-cert/evaltest.dat
Commit message (Collapse)AuthorAgeFilesLines
* Slightly edited evaltest of ikev2/ocsp-untrusted-cert scenarioAndreas Steffen2014-03-311-1/+1
|
* revocation: Restrict OCSP signing to specific certificatesMartin Willi2014-03-311-2/+1
| | | | | | | | | | | | | To avoid considering each cached OCSP response and evaluating its trustchain, we limit the certificates considered for OCSP signing to: - The issuing CA of the checked certificate - A directly delegated signer by the same CA, having the OCSP signer constraint - Any locally installed (trusted) certificate having the OCSP signer constraint The first two options cover the requirements from RFC 6960 2.6. For compatibility with non-conforming CAs, we allow the third option as exception, but require the installation of such certificates locally.
* upgraded ikev2 scenarios to 5.0.0Andreas Steffen2012-05-111-7/+7
|
* due to a bug fix reverted to the previous RULE_CRL_VALIDATION checkAndreas Steffen2011-09-091-1/+1
|
* adapted evaltest.dat to new RULE_OCSP_VALIDATIONAndreas Steffen2010-09-011-1/+1
|
* merged multi-auth branch back into trunkMartin Willi2009-04-141-1/+1
|
* adapted ikev2 uml scenarios for the 4.2 versionAndreas Steffen2008-04-011-3/+5
|
* addedAndreas Steffen2007-03-141-0/+5